+ PAGE 6 THE UNIVERSITY DAILY KANSAN KANSAN PUZZLES SPONSORED BY WEDNESDAY, DECEMBER 3, 2014 ACROSS ORDER ONLINE MINSKYS.COM ACROSS 1 "The Walking Dead" network 4 Radiate light 8 Entreaty 12 "Go, team!" 13 Ireland 14 Jute fiber 15 Hearty quaff 16 K, on the diamond 18 "Carmen" composer 20 Operated 21 Every 24 Hayseed 28 Fork over 32 Soy paste 33 Vanna's cohort 34 Heavy reading 36 Vegas preceder 37 Curved lines 39 Explain in detail 41 Detox center 43 Hook's henchman DOWN 44 Pirouette pivot 46 Bovine feature 50 Diffuse 55 Anger 56 Burn aid 57 "One-L lama" poet 58 Time of your life? 59 Vanessa's sister 60 War god 61 Turf 1 Speedy steed 2 Timbuktu's country 3 Word on a bistro awning 4 School of psychology 5 Illuminated 6 Hockey great Bobby 7 Dam 8 Wunderkind 9 Zodiac cat 10 Ostrich's cousin 11 Suitable 17 Band-leader Kyser 19 Slithery swimme 22 Doves' vocabulary 23 Camel's pair CK OUT NSWERS INSAN.COM 25 Narc's measure 26 Jacob's brother 27 Missing 28 Mast 29 Tortoise rival 30 Make art with acid 31 Abound 35 Detec-tives 38 Shiny cotton fabric 40 Began 42 Feathery neck-piece 45 — St. Vincent Millay 47 "Buenos —" 48 There-fore 49 Oboe insert 50 "Erie Canal" mule 51 Thickness 52 Director Howard 53 Rowing need 54 Work wit 1 2 3 4 5 6 7 8 9 10 11 12 | | | 13 | | | | 14 | | | 15 | | | 16 | | | | 17 | | | 18 | | | 19 | | | 20 | | | | |---|---|---|---|---|---|---|---|---|---| | | | 21 | | 22 | 23 | 24 | | 25 | 26 | 27 | 28 29 30 | | | | | 31 | 32 | | | | 33 | | | 34 | | | 35 | 36 | | | 37 | | | 38 | 39 | | | 40 | | | 41 | | | 42* | 43 | | | | | | | | | 44 | | 45 | | 46 | | 47 | 48 | 49 | 50 51 52 | | | | 53 54 | | | 55 | | | 56 | | | | 57 | | | 58 | | | 59 | | | | 60 | | | 61 | | | SUDOKU | | | 5 | 9 | | | 4 | 2 | | :--- | :--- | :--- | :--- | :--- | :--- | :--- | :--- | | | 2 | | | | 3 | | | | 8 | | | | 5 | | | | | 6 | | | | 9 | | | | | 9 | | | | 7 | | | | | 5 | 3 | 1 | | 8 | 4 | 9 | | | 7 | | | 8 | 3 | | | 4 | | 2 | | | 5 | 4 | | | 6 | | | 1 | 8 | | | 7 | 3 | | CRYPTOQUIP BVN RMGDBU LABIG LS LNZTXGMRMSY DBUQLSW QXBNIDMSY GFT ZTXW ATRG UBGGBTR: "RVBYLS'R FTXBTR." Today's Cryptoquip Clue: L equals A "The Interview" comes out on Christmas. Over the summer, North Korea warned that the release of the comedy would be an "act of war that we will never tolerate." It said the U.S. will face "merciless" retaliation. He said the details he has seen point instead to hacktivists, who break into computers to make a political point, often one involving the free exchange of information on the Internet. Hacktivists targeted Sony in the past. "State-sponsored attackers don't create cool names for themselves like 'Guardians of Peace' and promote their activity to the public," said cybersecurity expert Lucas Zaichkowsky. FBI spokesman Joshua Campbell would not comment Tuesday on whether North Korea or another country was behind the attack. The FBI is investigating. Experts doubt N. Korea hacked Sony Pedestrians cross a street in front of the Sony Pictures Entertainment headquarters in Culver City, Calif., on Tuesday. The FBI has confirmed it is investigating a recent hacking attack at Sony, which caused major internal computer problems at the film studio last week. MARTHA MENDOZA Associated Press It would be unusual if North Korea was behind the breach, said Darren Hayes, director of cybersecurity at Pace University's computer science school. Some cybersecurity experts say it is unlikely North Korea was behind the cyberattack that crippled Sony Pictures' computers and possibly leaked unreleased movies online. NICK UT /ASSOCIATED PRESS "However, there are numerous hackers for hire" in some of the shadowy corners of the Internet, he said. "If Kim Jong Un has developed his own rank-and-file cyberattack unit, with sophisticated capabilities, then we should be very concerned." Speculation has been rampant that the hard-line communist state sponsored last week's hack in anger over the new Sony movie "The Interview," in which Seth Rogen and James Franco play television journalists assigned by the CIA to assassinate North Korean leader Kim Jong Un. Sony Pictures hasn't said how the hackers breached its system. But such attacks often start with "phishing" attempts, a compromised website or a malicious insider, said cybersecurity researcher Craig Young at Tripwire, a security software company that works with such businesses as Visa, Mastercard, Walmart and Starbucks. Given that the hackers were apparently able to obtain unreleased movies as well as personnel records, Social Security numbers, passport photos, technical documents and other material. Young said it is unlikely they used just a single point of access. "State-sponsored attackers don't create cool names for themselves like 'Guardians of Peace' and promote their activity to the public." LUCAS ZAICHKOWSKY Cybersecurity expert "It's much more likely that attackers were able to exploit a series of vulnerabilities, misconfigurations and poor network architecture to continuously increase their level of access over time," he said. The increased dependence on cloud technology by nearly all major businesses to store their information has made them more vulnerable, said Carson Sweet, CEO of data-protection firm CloudPassage. Sony workers last week logged on to see a message on their computer screens that said "Hacked by #GOP," which may be the initials of a group calling itself Guardians of Peace, according to Variety. Some unreleased Sony movies such as "Still Alice," "Annie," "Mr. Turner" and "To Write Love on Her Arms" were later distributed online, along with the still-in-theaters "Fury," though a direct connection to the hacking hasn't been confirmed. Sony has brought in forensic experts from the Mandiant division of FireEye, a Silicon Valley cybersecurity company, according to a person familiar with the case who spoke on condition of anonymity because the companies have not yet announced the arrangement. Culver City, Calif.,based Sony Pictures said Monday that it is still dealing with the effects of the cyberattack and is working closely with law enforcement officials to investigate. Mandiant helps companies determine the extent of breaches and repair the damage. It has worked on other high-profile computer break-ins, including the one at Target last year. +